Lector de Feeds
Talk:Persistent live systems
← Older revision
Revision as of 08:31, 10 December 2025
Line 84:
Line 84:
[[User:Nikos5446]] [[User:Nikos5446]]
+
+----
+[[User:Morgano|morgano]] ([[User talk:Morgano|talk]]) 08:31, 10 December 2025 (UTC)
+
+Thank you for the tip Nikos.
+
+But are you sure it really is noticeably faster? It need to load the program from the USB anyway.
+
+I guess(have not tested) you need more than 2GB RAM for this method to work nicely, especially with a non minimalistic DE (think Plasma) and hungry program like Firefox?
+
+BTW, if you want to update or improve the page, please go ahead :) I do not have much time anymore. Just make sure you test things first :)
+
+Also, by now, I think we now can remove the stuff that is elder than Mageia 8, like suggested by sturmvogel earlier, see top post above.
Morgano
Categorías: Wiki de Mageia
Talk:Persistent live systems
firejail
← Older revision Revision as of 08:16, 10 December 2025 Line 72: Line 72: One big advantage with Live is that if the updates or settings foul up (been there), (i.e by glitchy connector) you can boot without the persistence. One big advantage with Live is that if the updates or settings foul up (been there), (i.e by glitchy connector) you can boot without the persistence. + +---- + +We could add the following in the "Tips" section: + +- If you have more than 2GBs of RAM available in your old computer, you could install firejail to run certain programs on the RAM. It is significantly faster than the USB stick (especially USB 2.0). But it also means that you will not be able to save almost anything. + Example commands: + "firejail --private falkon" + "firejail --private firefox" + "firejail --private --appimage ~/apps/librewolf/LibreWolf.x86_64.AppImage" + +[[User:Nikos5446]] Nikos5446
Categorías: Wiki de Mageia
MGASA-2025-0325 - Updated webkit2 packages fix security vulnerabilities
Publication date: 09 Dec 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-13947 , CVE-2025-43421 , CVE-2025-43458 , CVE-2025-66287 Description A website may be able to exfiltrate sensitive system information. Description: The issue was addressed through improved state checks - CVE-2025-13947. Processing maliciously crafted web content may lead to an unexpected process crash. Description: Multiple issues were addressed by disabling array allocation sinking - CVE-2025-43421. Processing maliciously crafted web content may lead to an unexpected process crash. Description: This issue was addressed through improved state management - CVE-2025-43458. Processing maliciously crafted web content may lead to an unexpected process crash. Description: The issue was addressed with improved memory handling - CVE-2025-66287. References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-13947 , CVE-2025-43421 , CVE-2025-43458 , CVE-2025-66287 Description A website may be able to exfiltrate sensitive system information. Description: The issue was addressed through improved state checks - CVE-2025-13947. Processing maliciously crafted web content may lead to an unexpected process crash. Description: Multiple issues were addressed by disabling array allocation sinking - CVE-2025-43421. Processing maliciously crafted web content may lead to an unexpected process crash. Description: This issue was addressed through improved state management - CVE-2025-43458. Processing maliciously crafted web content may lead to an unexpected process crash. Description: The issue was addressed with improved memory handling - CVE-2025-66287. References
- https://bugs.mageia.org/show_bug.cgi?id=34802
- https://webkitgtk.org/security/WSA-2025-0009.html
- https://webkitgtk.org/2025/12/04/webkitgtk2.50.3-released.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13947
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43421
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43458
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66287
- webkit2-2.50.3-1.mga9
Categorías: Actualizaciones de Seguridad
MGASA-2025-0324 - Updated python3 packages fix security vulnerabilities
Publication date: 09 Dec 2025
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-13836 , CVE-2025-13837 , CVE-2025-12084 Description Excessive read buffering DoS in http.client. (CVE-2025-13836) Out-of-memory when loading Plist. (CVE-2025-13837) Quadratic complexity in node ID cache clearing. (CVE-2025-12084) References
Type: security
Affected Mageia releases : 9
CVE: CVE-2025-13836 , CVE-2025-13837 , CVE-2025-12084 Description Excessive read buffering DoS in http.client. (CVE-2025-13836) Out-of-memory when loading Plist. (CVE-2025-13837) Quadratic complexity in node ID cache clearing. (CVE-2025-12084) References
- https://bugs.mageia.org/show_bug.cgi?id=34808
- https://www.openwall.com/lists/oss-security/2025/12/05/5
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13836
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13837
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12084
- python3-3.10.18-1.5.mga9
Categorías: Actualizaciones de Seguridad
QA ISO testers
For Qa team:
← Older revision Revision as of 13:20, 9 December 2025 Line 95: Line 95: * Aussie_matt - Xboxboy - xboxboy dot mageia at gmail dot com * Aussie_matt - Xboxboy - xboxboy dot mageia at gmail dot com −* papoteur - Yves Brungard - yves.brungard_mageia at gadz dotorg+* papoteur - Yves Brungard - yves.brungard+mageia at gadz dotorg * tonyb - Tony Blackwell - tablackwell at bigpond dot com * tonyb - Tony Blackwell - tablackwell at bigpond dot com Papoteur
Categorías: Wiki de Mageia
MediaWiki:Titlewhitelist
Adding nikos5446
← Older revision Revision as of 12:15, 9 December 2025 Line 121: Line 121: User:mvt7 User:mvt7 + +User:nikos5446 User:nmalykh User:nmalykh Marja
Categorías: Wiki de Mageia




